Blog Categories

Blog

Tuesday 5/21
Millions of Instagram influencers and brands had their private contact data scraped and exposed
From a brief review of the data, each record contained public data scraped from Instagram accounts, including their bio, profile picture, the number of followers they have, if they’re verified and their location by city and country, but also contained private contact information, such as the Instagram account owner’s email address and phone number.
https://tcrn.ch/2QgvvWa
Citrix Usher... read more.

Monday 5/13
Update Your Drivers Right Now If You Have An NVIDIA GeForce, Quadro or Tesla Graphics Card
Nvidia has uncovered and patched three vulnerabilities in the Windows display drivers for the company’s GeForce, Quadro and Tesla graphics cards. If exploited, the vulnerabilities could lead to denial of service, escalation of privileges or information disclosure on the host machines.
http://bit.ly/2JhRtYk
HyTrust Launches Full-Scale Security Platform for VMware, AWS, Containers
HyTrust CloudCon... read more.

Monday 5/6
Hackers steal card data from 201 online campus stores from Canada and the US
A group of hackers has planted malicious JavaScript code that steals payment card details inside the e-commerce system used by colleges and universities in Canada and the US. The malicious code was found on 201 online stores that were catering to 176 colleges and universities in the US and 21 in Canada.
https://zd.net/2GZBMl8
Shellbot malware evolves to spread and shuts down other cryptominers
The malware has new ca... read more.

I remember when Windows NT 4.0 Terminal Server edition was released, and the integrated capability of having more than one user access a server at a time was born. Sure, Citrix had created this already with WinFrame on Windows NT 3.51, but Windows NT 4.0 Terminal Server edition brought the functionality to the native operating system. We take this for granted now, with every administrator of a Windows server environment heavily relying on RDP for their day-to-day jobs. But it was an exciting time.
But the... read more.

To follow up on my previous blog about the Cloud First world we live in, I thought it would be helpful to highlight an area where the cloud offers a great AND low cost solution for Citrix disaster recovery. The costs of having workloads in the cloud are typically the largest obstacle for our customers to start the journey to the cloud. Citrix teamed up with Microsoft to deliver an option that reduces cost for production workloads and almost eliminates cost for disaster recovery.
How does it work?
The cost... read more.

Monday 4/29
Researchers develop new technique to identify malware in embedded systems
At issue are so-called micro-architectural attacks. This form of malware makes use of a system’s architectural design, effectively hijacking the hardware in a way that gives outside users control of the system and access to its data.Spectre and Meltdown are high-profile examples of micro-architectural malware.
http://bit.ly/2GQg3Nr
Chrome on Android: Phishing attackers can now trick you with fake address bar
Nor... read more.

The NIST Privacy Framework discussion draft has been published. This document incorporates the outlines and stakeholder input received to date.
https://www.nist.gov/sites/default/files/documents/2019/04/30/nist-privacy-framework-discussion-draft.pdf
The Drafting the NIST Privacy Framework: Workshop #2 will be held on May 13-14, 2019, at the Georgia Tech Scheller College of Business in Atlanta, Georgia. Feedback is also welcome via email at privacyframework@nist.gov (which will not be posted online).... read more.

Monday 4/22
Popup enlarges at the last second so users click on ads instead of ‘Close’ button
When the user moves his mouse to close the popup, CSS code from that page will expand the popup and move the ad in the cursor's path, so any click on the close button will actually land on the ad instead.
https://zd.net/2GrhmkN
How to prevent rootkit-enabled malware Scranos from harming your organization
Scranos cloaks itself as cracked software or apps that pose as legitimate programs, such as ebo... read more.

Monday 4/15
CyberArk Named Top Security Solution for Government Agencies
CyberArk is recognized as the premier cybersecurity solution for government agencies and organizations to protect against the exploitation of privileged accounts, credentials and secrets across every environment – including on the endpoint and across on-premises, hybrid cloud and DevOps environments.
http://bit.ly/2UXTu1j
‘Exodus’ spyware posed as a legit iOS app
Once installed, Exodus could access photos, videos... read more.

Monday 4/8
This prolific phishing gang is back with new tactics to target executives
A prolific cyber-criminal phishing operation which built a list of 50,000 executives, CFOs and other top financial personnel has expanded its operations with a new database of additional targets. The Business Email Compromise (BEC) group dubbed London Blue distributes phishing emails in an effort to trick organisations into transferring large sums of money into their accounts, often while posing as executives and oth... read more.